Analysis
-
max time kernel
150s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 22:22
Static task
static1
Behavioral task
behavioral1
Sample
fc899ef4f69fcf79252fd8645d7481f6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fc899ef4f69fcf79252fd8645d7481f6.exe
Resource
win10v2004-20231215-en
General
-
Target
fc899ef4f69fcf79252fd8645d7481f6.exe
-
Size
802KB
-
MD5
fc899ef4f69fcf79252fd8645d7481f6
-
SHA1
d4563602be99e3b39b2f270c1954651640b66f50
-
SHA256
976680e71079f880dfbcf2ec9865ab9eed2626438dbe7c9998ed53918bf71f1d
-
SHA512
543832adb4376134d83e2f5f57f24f8a58d736956e3ff49508d34d51dc0771b229ec68c1ae52a869a2b4754fda26d01a3d1dd213b3d251907a0b9f6209b53304
-
SSDEEP
24576:FRmJkcoQricOIQxiZY1WNfmLxWlcdGUEX:KJZoQrbTFZY1WNfmLxWlqGUEX
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1784-0-0x0000000000400000-0x00000000004BF000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 5044 PING.EXE 2724 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1784 fc899ef4f69fcf79252fd8645d7481f6.exe 1784 fc899ef4f69fcf79252fd8645d7481f6.exe 1784 fc899ef4f69fcf79252fd8645d7481f6.exe 1784 fc899ef4f69fcf79252fd8645d7481f6.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1784 wrote to memory of 652 1784 fc899ef4f69fcf79252fd8645d7481f6.exe 101 PID 1784 wrote to memory of 652 1784 fc899ef4f69fcf79252fd8645d7481f6.exe 101 PID 1784 wrote to memory of 652 1784 fc899ef4f69fcf79252fd8645d7481f6.exe 101 PID 652 wrote to memory of 5044 652 cmd.exe 103 PID 652 wrote to memory of 5044 652 cmd.exe 103 PID 652 wrote to memory of 5044 652 cmd.exe 103 PID 652 wrote to memory of 2724 652 cmd.exe 104 PID 652 wrote to memory of 2724 652 cmd.exe 104 PID 652 wrote to memory of 2724 652 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc899ef4f69fcf79252fd8645d7481f6.exe"C:\Users\Admin\AppData\Local\Temp\fc899ef4f69fcf79252fd8645d7481f6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\uecubrb.bat2⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.13⤵
- Runs ping.exe
PID:5044
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.13⤵
- Runs ping.exe
PID:2724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175B
MD5c0893ce69d639d8b2f147d4ab1e5213a
SHA1f164505943314cd455526c0e09fc105cea7a393d
SHA256163649dc62ca991e4224195bcba116c5dfee8d9719bb9ca5a89c341953cb8b6c
SHA51264dcb333e556e577dc73d996f5061f3ce1e9a2e758eb2cbe035a1c19d1284ea797871dcd2f4db4cce133fe6897c0873d9a895b8d2c6868495c0db92235727159